-
Dec 4, 2019
Recently, the italian hosting provider Netsons [1] discovered some unauthorized access on its Management System, occurred on March 2019. According with GDPR article 34 [2], Netsons had to inform its custover about the databreach. Here the statement: we would like… read more »
-
Dec 4, 2019
Researchers by cybersecurity firm Nyotron has discovered a new way that lets windows malware to modify files in a unique style that current anti-ransomware solutions are unable to identify. The technique [1] exploits documented Windows file system rename operations, altering… read more »
-
Dec 3, 2019
Hewlett Packard Enterprise has issued a notice about some of its solid-state hard drives: they have a defect that causes the crash of the drive after exactly 32.768 hours of operation (3 years, 270 days and 8 hours). A firmware's… read more »
-
Dec 2, 2019
This week i was very busy at work, so i wasn't able to collect a lot of news. However, the few news i've read are really juicy stuff: for example, E.T. is back! So, let's talk about Mixcloud, Signal, unsecure… read more »
-
Nov 29, 2019
Despite in the last months the infection number is decreasing (source), finding yourself with personal or corporate files blocked by a ransomware attack is a widespread drama. But luckily there are little-known people who work to get out of trouble… read more »
-
Nov 28, 2019
In last years, the way that operating systems are developed, deployed, and maintained evolved quickly.Similarly, the skillsets of memory analysts and their preferred work flows have changed to meet a world with increasingly large volumes of complex data. In order… read more »
-
Nov 27, 2019
Cloudflare released a new open source vulnerability scanner that uses Nmap results to generate more complex vulnerability reports. The tool, called Flan Scan, is a Python script developed in order to fill-the-gap between “industry standard” scanners and Cloudflare's compliance scans… read more »
-
Nov 26, 2019
Researchers from Paloalto Networks' Unit42 discovered an issue in the implementation of the Docker cp command that can lead to full container escape if exploited by an attacker. This would allow an attacker full root control of the host and… read more »